Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
17 Cards in this Set
- Front
- Back
biometric security measures
|
technique or device that examines a finger print, voice pattern, or the the iris or retina of the eye
|
|
Filtering
|
A process that can be used to cut down on or eliminate most junk mail.
|
|
Fraud
|
Something intended to decieve; deliberate trickery intended to gain an advantage
|
|
Hoax
|
An attempt to decive an audience into believing that something false is real
|
|
Logic Bomb
|
Computer virus triggered by the appearance or disappearance of specified data
|
|
Netiquette
|
a combination of the words net and etiqutte, refers to good manners and proper behaviors when communication through electronic media
|
|
phishing
|
types of info scanning
|
|
pyramid schemes
|
an illicit business model where profits are based on the investors ability to recruit other indviduals who are enrolled to make payments to their recruiters. Generally, neither a product or service is delivered
|
|
Rdf Summary
|
A format originally developed to faciliate the syndication of news article
|
|
spam
|
Unsolicited commercial e-mail that is sent to many people at the smae time to promote products or services: also called junk e-mail
|
|
tagging
|
The practice of adding keywords to content to simplify searching
|
|
Teleconferencing
|
Telecommunications service in which parties in remote locations can participate via telephone in a group meeting
|
|
Time Bomb
|
computer virus that does not cause its damage until a certain date or until the system has been booted a certain number of times
|
|
Trojan Horse
|
computer virus that does something different from what it is expected to do
|
|
Urban Legend
|
story which at one time could have been partially true, but has grown from constant retelling into a myhtical yarn
|
|
Virus
|
a computer program that is written to cause corruption
|
|
Worm
|
computer virus that makes many copies of itself, resulting in the consumption of system resources that slows down or or actually halts tasks
|